Search alternatives:
hiding algorithm » scheduling algorithm (Expand Search), cosine algorithm (Expand Search)
post algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
data hiding » data mining (Expand Search)
develop » developed (Expand Search)
hiding algorithm » scheduling algorithm (Expand Search), cosine algorithm (Expand Search)
post algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
data hiding » data mining (Expand Search)
develop » developed (Expand Search)
-
1
Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm
Published 2022“…Researchers have scrutinized data hiding schemes in recent years. Data hiding in standard images works well, but does not provide satisfactory results in distortion-sensitive medical, military, or forensic images. …”
Get full text
-
2
Bird’s Eye View feature selection for high-dimensional data
Published 2023“…BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …”
-
3
A Survey and Comparison of Post-Quantum and Quantum Blockchains
Published 2023“…The first approach involves post-quantum blockchains, which aim to utilize classical cryptographic algorithms resilient to quantum attacks. …”
-
4
Legal and Ethical Considerations of Artificial Intelligence for Residents in Post-Acute and Long-Term Care
Published 2024“…<p>This article proposes a framework for examining the ethical and legal concerns for using artificial intelligence (AI) in post-acute and long-term care (PA-LTC). It argues that established frameworks on health, AI, and the law should be adapted to specific care contexts. …”
-
5
Particle swarm optimization algorithm: review and applications
Published 2024“…Particle swarm optimization (PSO) is a heuristic global optimization technique and an optimization algorithm that is swarm intelligence-based. It is based on studies into the movement of bird flocks. …”
Get full text
-
6
RHEEMix in the data jungle: a cost-based optimizer for cross-platform systems.
Published 2020“…Our main contributions are: (i) a mechanism based on graph transformations to explore alternative execution strategies; (ii) a novel graph-based approach to determine efficient data movement plans among subtasks and platforms; and (iii) an efficient plan enumeration algorithm, based on a novel enumeration algebra. …”
-
7
-
8
Prediction of pressure gradient for oil-water flow: A comprehensive analysis on the performance of machine learning algorithms
Published 2022“…<p dir="ltr">Pressure gradient (PG) in liquid-liquid flow is one of the key components to design an energy-efficient transportation system for wellbores. This study aims to develop five robust machine learning (ML) algorithms and their fusions for a wide range of flow patterns (FP) regimes. …”
-
9
Towards Scalable Process Mining Pipelines
Published 2023“…Contributions have covered the spectrum of better algorithms, richer comparison metrics, and movement towards online analysis for process data. …”
Get full text
Get full text
Get full text
-
10
A Fuzzy Low-Dimensional Intersection Graph Representation Approach for Graph Compression and Anonymization
Published 2021“…The large amount of data represented as a network, or graph, sometimes exceeds the resources of a conventional computing device. …”
Get full text
Get full text
Get full text
masterThesis -
11
-
12
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
Get full text
-
13
Digital Image Watermarking Using Balanced Multiwavelets
Published 2006“…The statistical model is based on a generalized Gaussian distribution. Limits of data hiding capacity clearly show that balanced multiwavelets provide higher watermarking rates. …”
Get full text
article -
14
Real-Time Path-Planning using Depth/INS Sensor Fusion for Localization
Published 2019Get full text
doctoralThesis -
15
Design of A Theoretical Framework For A Real-Time Fire Evacuation Guidance System
Published 2020Get full text
doctoralThesis -
16
Solar power forecasting beneath diverse weather conditions using GD and LM-artificial neural networks
Published 2023“…A case study has been done in the Peer Panjal region. The data collected for four months with various parameters have been applied randomly as input data using GD and LM type of artificial neural network compared to actual solar energy data. …”
Get full text
-
17
Automated skills assessment in open surgery: A scoping review
Published 2025“…The assessment input for the automation algorithms were predominantly hand movement. Around 37.5 % (<i>n </i>= 15) of the studies assessed algorithm performance using classification accuracy. …”
-
18
Performance Analysis of Artificial Neural Networks in Forecasting Financial Time Series
Published 2013Get full text
doctoralThesis -
19
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
Published 2019“…These were subjected to two different processes called contrast enhancement and segmentation of vein regions. Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …”
-
20
Applications of fast fourier transform in the integrity evaluation of deep foundations
Published 2016“…This paper reports on an innovative and comprehensive method proposed for the quality control of drilled shafts that overcomes several limitations of conventional methods. The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …”
Get full text
Get full text
Get full text
Get full text
article